The grid
ACM SIGAda Ada Letters
Protecting sensitive attributes in automated trust negotiation
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Supporting Secure Ad-hoc User Collaboration in Grid Environments
GRID '02 Proceedings of the Third International Workshop on Grid Computing
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
Euro-Par '01 Proceedings of the 7th International Euro-Par Conference Manchester on Parallel Processing
A Community Authorization Service for Group Collaboration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Certificate-based authorization policy in a PKI environment
ACM Transactions on Information and System Security (TISSEC)
The PRIMA System for Privilege Management, Authorization and Enforcement in Grid Environments
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
Protecting privacy during on-line trust negotiation
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Role-based cascaded delegation
Proceedings of the ninth ACM symposium on Access control models and technologies
Proceedings of the tenth ACM symposium on Access control models and technologies
A note on the anatomy of federation
BT Technology Journal
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!
Proceedings of the eleventh ACM symposium on Access control models and technologies
Privacy Preserving Trust Authorization Framework Using XACML
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
XACML Policy Integration Algorithms
ACM Transactions on Information and System Security (TISSEC)
Automated xacml policy reconfiguration for evaluation optimisation
Proceedings of the fourth international workshop on Software engineering for secure systems
Trust on the world wide web: a survey
Foundations and Trends in Web Science
Policy decomposition for collaborative access control
Proceedings of the 13th ACM symposium on Access control models and technologies
Automatic enforcement of location aware user based network access control policies
TELE-INFO'08 Proceedings of the 7th WSEAS International Conference on Telecommunications and Informatics
P4A: A New Privacy Model for XML
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Location aware self-adapting firewall policies
WSEAS TRANSACTIONS on COMMUNICATIONS
Policy based access for home contents and services
CSTST '08 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology
Behavioral attestation for web services (BA4WS)
Proceedings of the 2008 ACM workshop on Secure web services
Security and privacy for geospatial data: concepts and research directions
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Fine-grained access control for GridFTP using SecPAL
GRID '07 Proceedings of the 8th IEEE/ACM International Conference on Grid Computing
International Journal of Computer Integrated Manufacturing
A Model for Authentication Credentials Translation in Service Oriented Architecture
Transactions on Computational Science IV
Use of XACML Policies for a Network Access Control Service
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
A specification language for information security policies
CIS'09 Proceedings of the international conference on Computational and information science 2009
Fine-Grain Access Control Using Shibboleth for the Storage Resource Broker
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Information protection via environmental data tethers
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
The OPL Access Control Policy Language
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
A DL-based method for access control policy conflict detecting
Proceedings of the First Asia-Pacific Symposium on Internetware
Fine-grained access control for EPC information services
IOT'08 Proceedings of the 1st international conference on The internet of things
Rule-based policy representations and reasoning
Semantic techniques for the web
Cue: a framework for generating meaningful feedback in XACML
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration
Journal of Biomedical Informatics
Attribute-Based Messaging: Access Control and Confidentiality
ACM Transactions on Information and System Security (TISSEC)
A language for provenance access control
Proceedings of the first ACM conference on Data and application security and privacy
Authorization recycling in hierarchical RBAC systems
ACM Transactions on Information and System Security (TISSEC)
Protecting critical infrastructures while preserving each organization's autonomy
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
A service-centric approach to a parameterized RBAC service
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Policy-based integration of user and provider-sided identity management
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Provenance explorer – customized provenance views using semantic inferencing
ISWC'06 Proceedings of the 5th international conference on The Semantic Web
Implementing a secure annotation service
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Adding support to XACML for dynamic delegation of authority in multiple domains
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
An architecture for privacy-aware inter-domain identity management
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Access control for semantic data federations in industrial product-lifecycle management
Computers in Industry
Policy-Based vulnerability assessment for virtual organisations
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Behavioral Attestation for Web Services Based Business Processes
International Journal of Web Services Research
Secure federation of semantic information services
Decision Support Systems
Behavioral Attestation for Web Services using access policies
Multimedia Tools and Applications
Hi-index | 0.00 |
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.